Exceptional training for APP & InfO securitY

Social Engineering Training Course

Social Engineering - Learn about the threats, attacks and how to prevent, defend and deter against these

3 Oct London
request info

Capita Marks and Spencer Telefonica Cisco BBC Lloyds Sony

Social Engineering training course (code: soceng)


Our Social Engineering training course gives an insight into the vulnerabilities exposed to businesses from the ‘human factor’.

Social Engineering exploits flaws in human weakness and constitutes one of the highest threats to organisations today, as they are able to use deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

Social engineering remains one of the most effective means of attacking organisations of all sizes.  Attackers are becoming more sophisticated. and are using a multitude of attack vectors.  Not only are they relying on technical means of attack but are exploiting human behaviour to gain information. 

Your staff need to be able to identify and defend against attempted attacks, both in the work place and whilst away using corporate IT equipment. 



  • This course is suitable for IT & security professionals.
  • This course is suitable for organisational Senior Leadership, managers and general staff.
  • A good understanding of common IT, internet and mobile devices.



Course attendees will learn about:

The Threat - You will gain an understanding of the techniques used by social engineers in the planning stages of an attack. We introduce you to key social engineering concepts, the goals of social engineering, and warn you about the tool’s attackers use to gain intelligence on your organisation. You will see real-time interactive demonstrations centred around the most popular and scalable forms of social engineering.

The Attack – You will explore and engage in the social engineering attacks used by the attackers and will learn how exposed you and your organisation may be to this every day common and significant threat.  This interactive training balances practical lectures and discussions to understand the ‘Social Engineering Attack Cycle’, with multiple interesting exercises and demonstrations that highlight weaknesses within organisations; weaknesses from employees which result in information security breaches.

Defend, Prevent, Deter – Social Engineering remains a high threat to organisations regarding information security breaches.  You will explore the options available, and the controls needed to minimise risk and diminish the threat to your organisation. This will culminate in an interactive War Gaming session, where you will formulate a plan of defence to take back to your organisation and use immediately. You will see what works, and what doesn't, and how to report on it to help the organization improve their defences and increase your snare rate. The course will equip you to deal with some of the ethical and risk challenges associated with social engineering engagements, understanding human behaviour, and how to defend against it.

Social Engineering Fundamentals

  • What is Social Engineering
  • Who conducts Social Engineering?
  • Why is Social Engineering so successful?
  • Ethics and Law
  • Psychology of the Social Engineer
  • Hacker vs Organisation    Team Exercise / Discussion

The Reconnaissance Phase (Open Source Intelligence)    OSINT Tools

•    Maltego
•    Shodan
•    Buscador
•    Google Alerts
•    Google Dorks
•    The Harvester
•    Metagoofil
•    Recon-NG
•    Have I been pawned

Cyber Kill Chain

  • Looking for vulnerabilities
  • The Social Engineering Attack Cycle    Information Gathering
  • Build Relationships and Rapport
  • Exploitation
  • Execution and covering your tracks (TOR)

The art of Phishing, (don’t get hooked!) - Technical    Phishing Tools 

•    Phishing (SET, NGROK)
•    SMShing,
•    Spear Phishing,
•    Whale Phishing,
•    Vishing

Spoofing Email – Demonstrations (Interactive)
•    Emkei
•    Anonymailer

The art of Phishing - Phishing – (Physical) (Interactive)
•    Listening Devices and Bugs
•    USB Drop (Ducky USB)
•    Dumpster diving
•    Pre-Texting
•    Tailgating
•    Shoulder Surfing
•    Lock Picking
•    Impersonation
•    Mobile phone recording

The art of Phishing – (Telephone)    Telephone Phishing

•    Pre-Texting
•    Impersonation

Credential Harvesting
Finding your organisations leaked credentials and the dark web    Credential Harvesting demonstrations

•    Have I been Pawned
•    Username and password harvesting
•    Password Re-use
•    Password cracking
•    Hashing/Cracking Hash
•    Dictionary/Brute Forcing
•    Darknet

Network (Packet) Sniffing – Open Networks (coffee shops etc.)    Network Tools

•    Wireshark
•    Network Miner

Mobile Device Exploitation – (Hacking Mobile Devices)

•    Mobile Phone
•    Probe Requests
•    Fake AP/SSID/Rogue Access Point
•    Rogue Network Devices
•    Fake Iframe/Portal – Username and Password Capture
•    De-authing Clients
•    Untrusted APK (Gaining remote access to mobile phone - data, SMS, camera, photos etc.)
•    Session Hijacking/Cookie Stealing

Privilege Escalation    
Vulnerability Assessing Your Systems

•    Nessus
•    CVE
•    Virus Total
•    Malware Testing

Educating the workforce    What can an organisation do to defend itself?
Practical tips and advice on implementation
Incident/Breach Management    Containment, Isolation and Managing Incidents
War Gaming Scenario    Team exercise and presentation
Final Questions, Discussion    
Networking and Close    

  • Social Engineering, humans & Security
  • Threats
  • Attacks
  • Defence
  • Prevention
  • Deterrance

Receive the latest version of this course into your inbox


3rd Oct 2019 - 2 days £1500

see all dates


Show Discount for this course


  Bring a JBI course to your office
  and train a whole team onsite
  0800 028 6400
or request quote

  You can customise this course to
  suit your exact needs here
  0800 028 6400 or request quote

0800 028 6400

Why JBI ?

►"great technology tips"
► "Access to exclusive content"
► "Short course means less time off"

►"Inspiring trainers"
► "Joined via web"
► "Knowledgable sales staff"

Get exclusive news about upcoming programs, technical insights & special offers

Google Apps Script
Authorisation is required to perform that action.